Solution
Please Install the Updated Packages.
Insight
BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols.
A flaw was discovered in the way BIND checked the return value of the OpenSSL DSA_do_verify function. On systems using DNSSEC, a malicious zone could present a malformed DSA certificate and bypass proper certificate validation, allowing spoofing attacks. (CVE-2009-0025)
For users of Red Hat Enterprise Linux 3 this update also addresses a bug which can cause BIND to occasionally exit with an assertion failure.
All BIND users are advised to upgrade to the updated package, which contains a backported patch to resolve this issue. After installing the update, BIND daemon will be restarted automatically.
Affected
bind on CentOS 2
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-0025 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities